General
-
Target
jew.mips.elf
-
Size
125KB
-
Sample
241206-qjd8lavnam
-
MD5
c5ac3c0d137d7a994fb24f0d05335848
-
SHA1
1aca371b36bf8170bdc06e7014a5aef1c89ac0d9
-
SHA256
bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d
-
SHA512
2dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80
-
SSDEEP
3072:k9CY3nsXRx2+hgnSXsxVLdEgrUpziNn3Ik8LINFb1lNWEB:k9CY3nsXRx2+hrXsxVLdEgrUrWFb1lND
Behavioral task
behavioral1
Sample
jew.mips.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
KURC
Targets
-
-
Target
jew.mips.elf
-
Size
125KB
-
MD5
c5ac3c0d137d7a994fb24f0d05335848
-
SHA1
1aca371b36bf8170bdc06e7014a5aef1c89ac0d9
-
SHA256
bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d
-
SHA512
2dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80
-
SSDEEP
3072:k9CY3nsXRx2+hgnSXsxVLdEgrUpziNn3Ik8LINFb1lNWEB:k9CY3nsXRx2+hrXsxVLdEgrUrWFb1lND
Score9/10-
Contacts a large (95313) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-